Table of Contents
Using your Rad1o in HackRF mode
When in “HackRF mode”, rad1o behaves like the HackRF (the very popular SDR by Michael Ossmann). That means that the rad1o has to be connected to a computer or smartphone and then acts as an interface to world of radiowaves.
Booting into HackRF mode
When in HackRF mode, the rad1o display shows something like “Booting HACKRF.BIN” or “Booting HKRF-OLD.BIN”. If not, change the mode.
Connecting to your PC
Connect a microUSB cable to port A.
Verifying connection
Linux: run
lsusb | grep -i OpenMoko
if there is a line of output, you're fine
Giving your user access to the device
Linux: Create a new file in
/etc/udev/rules.d
with the .rules suffix, containing
SUBSYSTEMS=="usb", ATTRS{idVendor}=="1d50", ATTRS{idProduct}=="6089", MODE:="0666" SUBSYSTEMS=="usb", ATTRS{idVendor}=="1d50", ATTRS{idProduct}=="cc15", MODE:="0666"
You can also download the file from here.
Getting libHackRF
You could install your distribution's libhackrf package. Or, you could take the easy route for all relevant dependencies (including GNU Radio and friends) you might meet later on and use http://pybombs.info (no root necessary for the stuff you build yourself):
git clone --recursive https://github.com/pybombs/pybombs.git cd pybombs #prepare to answer a lot of questions with the default answer #if you're not on debian/ubuntu you should change the install preferences away from deb,src ./pybombs install hackrf ./pybombs install gnuradio gr-osmosdr #create and use shell setup script ./pybombs env #bash: echo "source /home/<username>/target/setup_env.sh" >> ~/.bashrc #zsh: >> ~/.zshenv
Testing stuff
osmocom_fft